IT News, Blog & Top Tips from SpecTronics

The 5 Most Costly Types of IT-Related Cybercrimes

09-Jul-2018 14:08:22 / by Chris Selby-Rickards posted in computer security, hackers, scams, hacking, theft, servers, small business, security, protection, ransomware, phishing, passwords, fraud, firewall, data breach, cybersecurity, cyberattack, cybercrime, cyber threats, cyber, computers, cloud, business, breaches, anti virus

0 Comments

Read More

Business Email Scammers Put Behind Bars

09-Jul-2018 12:21:36 / by Chris Selby-Rickards posted in anti virus, business, Business operations, computers, cyber attacks, cyber, cyber crime, cybersecurity, cybercrime, cyberattack, email, Disaster Recovery, fraud, IT Support, london, office 365, phishing, security, small business, ransomware

0 Comments

Read More

PDF Files: Handy for Businesses — and Hackers

19-Apr-2018 22:14:57 / by Chris Selby-Rickards posted in hackers, pdf, hacking, security, ransomware, IT, helpdesk, fraud, data breach, cybersecurity, cyberattack, cybercrime, cyber, business, Backup, anti virus

0 Comments

PDF files are the No. 1 type of file used in cyberattacks. Find out why hackers like to use them and how to protect your business.

Read More

How to Protect Your Business from Credential Stuffing Attacks

19-Apr-2018 14:21:00 / by Chris Selby-Rickards posted in theft, technology, support, solutions, small business, service, security, ransomware, protection, policy, phishing, passwords, MSP, IT Support, IT Services, london, helpdesk, fraud, firewall, fileless attacks, Disaster Recovery, data breach, data backup, Data, cybersecurity, cybercrime, cyberattack, cyber threats, cyber, computers, cloud, breaches, breach, Backup, anti virus, Business operations, business

0 Comments

Around 5 billion stolen credentials are available on the dark web, and cybercriminals like to use them in credential stuffing attacks. Learn how credential stuffing attacks work and what you can do to protect your company from them.

Read More

Hackers Are Trying to Trick Android Users into Downloading Powerful Spyware

21-Feb-2018 16:32:54 / by Chris Selby-Rickards posted in windows 10, cloud computing, cybersecurity, firewall, Business operations, Data, IT, News, phishing, ransomware, anti virus, business, cloud, computers, cyber threats, cyberattack, cybercrime, email, fraud, passwords, protection, security, small business

0 Comments

To get Android users to download the Skygofree spyware, cybercriminals have been spoofing wireless service providers’ websites. Discover what you can do to prevent your business’s Android devices from becoming infected.

Read More

Would You Pay to Get Your Business’s Data Back?

16-Jan-2018 12:42:42 / by Chris Selby-Rickards posted in cybersecurity, firewall, solutions, Business operations, cyber crime, News, phishing, ransomware, theft, anti virus, business, cyber, cyberattack, fraud, gdpr, protection, security, small business

0 Comments

If you came to work one morning and found that your company was the victim of a ransomware attack, would you pay the ransom? Find out why security experts recommend not giving into hackers’ demands and why many organizations do not heed this advice.

Read More

Why You Should Migrate Your Website From HTTP to HTTPS

10-Jan-2018 17:31:31 / by Chris Selby-Rickards posted in windows 10, cloud computing, cybersecurity, firewall, network, Business operations, Data, http, IT, News, online shopping, phishing, anti virus, business, chrome, computers, credit cards, cyberattack, cybercrime, email, fraud, google, https, passwords, protection, security, small business

0 Comments

You may have seen news reportsrecently about websites switching over to HTTPS. But what does it mean?

Read More

Hackers Are Masquerading as Trusted Business Contacts

04-Dec-2017 13:15:38 / by Ben Spector posted in cloud computing, cybersecurity, Business operations, IT, News, phishing, ransomware, support, theft, anti virus, business, computers, cyber, cyber threats, cyberattack, cybercrime, email, fraud, passwords, protection, security

0 Comments

 

Read More

How to Reduce Your Costs If Your Data Is Breached

21-Jul-2017 11:49:00 / by Chris Selby-Rickards posted in data breach, budgeting, small business, business, cybersecurity, cyberattack, costs, windows, theft, support, solutions, IT Support, IT Services, IT, helpdesk, fraud, firewall, fileless attacks, Disaster Recovery, Business operations, breach, Backup

0 Comments

Being prepared for a data breach can save your business a great deal of money if one occurs. Discover what the top three preparations are and the extent to which they can reduce data breach costs.

Data breaches are occurring at record pace in 2017 in the United States and other parts of the world. Taking preventive measures, such as locking down your network, using security software, and creating strong passwords, can make it much harder for cybercriminals to infiltrate your business. However, despite your best efforts to prevent a data breach, your company might still experience one. This is partly due to the fact that data breaches are not always the result of cyberattacks. They are also caused by human error, system glitches, and malicious insiders.

Read More

Don't Let Your Business Become the Next Spear Phishing Victim

25-May-2017 12:53:40 / by Ben Spector posted in anti virus, computers, cyber, email, firewall, fraud, IT, News, phishing, security, theft

0 Comments

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) from more than 22,000 companies worldwide using a type of spear phishing attack known as a Business Email Compromise (BEC) scam, according to the U.S. Federal Bureau of Investigation (FBI). BEC scams specifically target companies that regularly send wire transfer payments or work with foreign suppliers.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts